메뉴 건너뛰기




Volumn 83, Issue 8, 2010, Pages 1524-1537

Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

Author keywords

Android; Intrusion detection; Knowledge based systems; Malware; Mobile devices; Temporal reasoning

Indexed keywords

ANTI VIRUS; CONTINUOUSLY MEASURED DATA; DETECTION RATES; EVALUATION RESULTS; HOST-BASED INTRUSION DETECTION SYSTEM; MALICIOUS BEHAVIOR; MALWARES; MOBILE DEVICE SECURITY; NEW APPROACHES; PRE-DEFINED CLASS; SECURITY EXPERTS; SMARTPHONES; SOFTWARE INSTALLATIONS; SYSTEM ON MOBILE DEVICES; TEMPORAL ABSTRACTION; TEMPORAL PATTERN; TEMPORAL REASONING;

EID: 77953137615     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2010.03.046     Document Type: Article
Times cited : (91)

References (38)
  • 2
    • 0020849266 scopus 로고
    • Maintaining knowledge about temporal intervals
    • Allen J.F. Maintaining knowledge about temporal intervals. Communications of the ACM 26 11 (1983) 832-843
    • (1983) Communications of the ACM , vol.26 , Issue.11 , pp. 832-843
    • Allen, J.F.1
  • 4
    • 63049091681 scopus 로고    scopus 로고
    • From desktop to mobile: examining the security experience
    • Botha R.A., Furnell S.M., and Clarke N.L. From desktop to mobile: examining the security experience. Computer and Security 28 (2009) 130-137
    • (2009) Computer and Security , vol.28 , pp. 130-137
    • Botha, R.A.1    Furnell, S.M.2    Clarke, N.L.3
  • 5
    • 51449120796 scopus 로고    scopus 로고
    • Mobile device profiling and intrusion detection using smart batteries
    • Buennemeyer, T.K. et al., 2008. Mobile device profiling and intrusion detection using smart batteries. International Conference on System Sciences, pp. 296-296.
    • (2008) International Conference on System Sciences , pp. 296-296
    • Buennemeyer, T.K.1
  • 6
    • 0034563991 scopus 로고    scopus 로고
    • CAPSUL: A constraint-based specification of repeating patterns in time-oriented data
    • Chakravarty S., and Shahar Y. CAPSUL: A constraint-based specification of repeating patterns in time-oriented data. Annals of Mathematics and AI 30 1-4 (2000) 3-22
    • (2000) Annals of Mathematics and AI , vol.30 , Issue.1-4 , pp. 3-22
    • Chakravarty, S.1    Shahar, Y.2
  • 8
    • 77955175843 scopus 로고    scopus 로고
    • http://www.ironport.com/pdf/ironport_new_anti-virus_formula.pdf
    • Dikinson J. The new antivirus formula (2005). http://www.ironport.com/pdf/ironport_new_anti-virus_formula.pdf http://www.ironport.com/pdf/ironport_new_anti-virus_formula.pdf
    • (2005) The new antivirus formula
    • Dikinson, J.1
  • 10
    • 57849163559 scopus 로고    scopus 로고
    • Keystroke dynamics-based authentication for mobile devices
    • Hwang S.S., Cho S., and Park S. Keystroke dynamics-based authentication for mobile devices. Computer and Security 28 (2009) 85-93
    • (2009) Computer and Security , vol.28 , pp. 85-93
    • Hwang, S.S.1    Cho, S.2    Park, S.3
  • 15
    • 0036095845 scopus 로고    scopus 로고
    • Enhancing profiles for anomaly detection using time granularities
    • Li Y., et al. Enhancing profiles for anomaly detection using time granularities. Journal of Computer Security 10 1-2 (2002) 137-157
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 137-157
    • Li, Y.1
  • 26
    • 50049091842 scopus 로고    scopus 로고
    • Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery
    • Racic, R., Ma, D., Chen, H., 2006. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery. Securecomm and Workshops, pp. 1-10.
    • (2006) Securecomm and Workshops , pp. 1-10
    • Racic, R.1    Ma, D.2    Chen, H.3
  • 27
    • 0031234827 scopus 로고    scopus 로고
    • IDAMN: an intrusion detection architecture for mobile networks
    • Samfat D., and Molva R. IDAMN: an intrusion detection architecture for mobile networks. IEEE Journal on Selected Areas in Communications 15 7 (1997) 1373-1380
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.7 , pp. 1373-1380
    • Samfat, D.1    Molva, R.2
  • 30
    • 77955175318 scopus 로고    scopus 로고
    • Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics
    • Shabtai A., Fledel Y., Elovici Y., and Shahar Y. Using the KBTA method for inferring computer and network security alerts from time-stamped, raw system metrics. Journal in Computer Virology 8 3 (2009) 267-298
    • (2009) Journal in Computer Virology , vol.8 , Issue.3 , pp. 267-298
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3    Shahar, Y.4
  • 31
    • 84867714245 scopus 로고    scopus 로고
    • Shabtai, A., Elovici, Y., 2010. Applying behavioral detection on android-based devices. In: Proceedings of the 3rd International Conference on Mobile Wireless Middleware, Operating Systems, and Applications (Mobilware 2010), Springer, Chicago, USA.
    • Shabtai, A., Elovici, Y., 2010. Applying behavioral detection on android-based devices. In: Proceedings of the 3rd International Conference on Mobile Wireless Middleware, Operating Systems, and Applications (Mobilware 2010), Springer, Chicago, USA.
  • 32
    • 0031069719 scopus 로고    scopus 로고
    • A framework for knowledge-based temporal abstraction
    • Shahar Y. A framework for knowledge-based temporal abstraction. Artificial Intelligence 90 1-2 (1997) 79-133
    • (1997) Artificial Intelligence , vol.90 , Issue.1-2 , pp. 79-133
    • Shahar, Y.1
  • 33
    • 0030200817 scopus 로고    scopus 로고
    • Knowledge-based temporal abstraction in clinical domains
    • Shahar Y., and Musen M.A. Knowledge-based temporal abstraction in clinical domains. Artificial Intelligence in Medicine 8 3 (1996) 267-298
    • (1996) Artificial Intelligence in Medicine , vol.8 , Issue.3 , pp. 267-298
    • Shahar, Y.1    Musen, M.A.2
  • 35
    • 51749114272 scopus 로고    scopus 로고
    • A survey of fuzzy cognitive maps learning method
    • Grzegorzewski, P, Krawczak, M, Zadrozny, S, Eds
    • Stach, W., Kurgan, L., Pedrycz, W., 2005. A survey of fuzzy cognitive maps learning method. In: Grzegorzewski, P., Krawczak, M., Zadrozny, S. (Eds.), Issues in Soft Computing: Theory and Applications, Exit, pp. 71-84.
    • (2005) Issues in Soft Computing: Theory and Applications, Exit , pp. 71-84
    • Stach, W.1    Kurgan, L.2    Pedrycz, W.3
  • 36
    • 77953131660 scopus 로고    scopus 로고
    • Specification and evaluation of polymorphic shellcode properties using a new temporal logic
    • Talbi M., Mejry M., and Bouhoula A. Specification and evaluation of polymorphic shellcode properties using a new temporal logic. Journal in Computer Virology (2008)
    • (2008) Journal in Computer Virology
    • Talbi, M.1    Mejry, M.2    Bouhoula, A.3
  • 37
    • 26444504890 scopus 로고    scopus 로고
    • A mobile phone malicious software detection model with behavior checker
    • Yap T.S., and Ewe H.T. A mobile phone malicious software detection model with behavior checker. Lecture Notes in Computer Science 3597 (2005) 57-65
    • (2005) Lecture Notes in Computer Science , vol.3597 , pp. 57-65
    • Yap, T.S.1    Ewe, H.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.